Movatterモバイル変換


[0]ホーム

URL:


US20100257598A1 - Integrated data traffic monitoring system - Google Patents

Integrated data traffic monitoring system
Download PDF

Info

Publication number
US20100257598A1
US20100257598A1US12/592,580US59258009AUS2010257598A1US 20100257598 A1US20100257598 A1US 20100257598A1US 59258009 AUS59258009 AUS 59258009AUS 2010257598 A1US2010257598 A1US 2010257598A1
Authority
US
United States
Prior art keywords
packet
event
event data
analysis
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US12/592,580
Other versions
US8832833B2 (en
Inventor
Robert James Demopoulos
David James Fladebo
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
B1 Group Inc
CLOUDCOVER Ltd
Original Assignee
Barrier Group
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Barrier GroupfiledCriticalBarrier Group
Priority to US12/592,580priorityCriticalpatent/US8832833B2/en
Publication of US20100257598A1publicationCriticalpatent/US20100257598A1/en
Assigned to THE BARRIER GROUPreassignmentTHE BARRIER GROUPASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: DEMOPOULOS, ROBERT JAMES, FLADEBO, DAVID JAMES
Priority to US14/480,299prioritypatent/US10326777B2/en
Application grantedgrantedCritical
Publication of US8832833B2publicationCriticalpatent/US8832833B2/en
Assigned to THE B1 GROUP, INC.reassignmentTHE B1 GROUP, INC.EXCHANGEAssignors: THE BARRIER GROUP, LLC
Assigned to CLOUDCOVER USA, INC.reassignmentCLOUDCOVER USA, INC.MERGER (SEE DOCUMENT FOR DETAILS).Assignors: THE B1 GROUP, INC.
Assigned to THE B1 GROUP, INC.reassignmentTHE B1 GROUP, INC.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: THE BARRIER GROUP, LLC
Assigned to CLOUDCOVER USA, INC.reassignmentCLOUDCOVER USA, INC.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: THE B1 GROUP, INC.
Assigned to CLOUDCOVER IP, LLCreassignmentCLOUDCOVER IP, LLCASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: CLOUDCOVER USA, INC.
Assigned to MONTGOMERY CAPITAL PARTNERS V, LPreassignmentMONTGOMERY CAPITAL PARTNERS V, LPSECURITY INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: CLOUDCOVER IP, LLC
Assigned to CLOUDCOVER, LTD.reassignmentCLOUDCOVER, LTD.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: CLOUDCOVER IP, LLC
Assigned to CLOUDCOVER IP, LLCreassignmentCLOUDCOVER IP, LLCRELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS).Assignors: MONTGOMERY CAPITAL PARTNERS V, LP.
Assigned to TEGO CYBER INC.reassignmentTEGO CYBER INC.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: CLOUDCOVER LTD
Assigned to TROUDT, JOHNreassignmentTROUDT, JOHNSECURITY INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: CLOUDCOVER, LTD
Assigned to CLOUDCOVER, LTD.reassignmentCLOUDCOVER, LTD.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: TEGO CYBER INC.
Adjusted expirationlegal-statusCritical
Expired - Lifetimelegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

The present invention includes an integrated data traffic monitoring system monitoring data traffic received from a communication network and destined for a protected network. The monitoring system includes a security appliance and one or more security and monitoring technologies such as hardware and open source and proprietary software products. The security appliance and the security and monitoring technologies may be implemented as separate and distinct modules or combined into a single security appliance. The security and monitoring technologies monitor network data traffic on, or directed to, the protected network. The monitoring system collects data from each of the technologies into an event database and, based on the data, automatically generates rules directing one or more of the technologies to prevent subsequent communications traffic from specific sources from entering the protected network.

Description

Claims (16)

10. A method of screening packets received from a communication network comprising:
receiving a packet associated with one of an e-mail message, a VPN connection, and a web page response, the packet having a source;
performing an intrusion detection analysis on the packet using a set of intrusion detection rules;
if the packet passes the intrusion detection analysis, performing a firewall analysis on the packet using a set of firewall rules;
if the packet passes the firewall analysis, determining if the packet is associated with an e-mail message, a VPN connection or a web page response;
if the packet is associated with an e-mail message, performing a virus analysis on the packet using a set of virus definitions;
if the packet is associated with a VPN connection, performing an authentication analysis on the packet using a set of authentication criteria; and
if the packet fails any of the intrusion detection analysis, the firewall analysis, the virus analysis, or the authentication analysis, automatically generating a new intrusion detection rule to delete any subsequent packets received from the same source as the packet.
16. A computing system for receiving communication packets from a communication network and transmitting the communication packets to a protected network, the computing system comprising:
an intrusion detection module that compares a communication packet to a set of rules and, based on the comparison, either transmits the communication packet to a firewall or deletes the communication packet and transmits event data based on the deleted communication packet to an event database;
an event database that stores an event record based on the event data received from the intrusion detection module and maintains a plurality of event records based on previously received event data; and
an integrated security system that analyzes the event data and the plurality of event records and, based on the results of the analysis, automatically generates at least one rule to the intrusion detection module.
US12/592,5802004-01-232009-11-27Integrated data traffic monitoring systemExpired - LifetimeUS8832833B2 (en)

Priority Applications (2)

Application NumberPriority DateFiling DateTitle
US12/592,580US8832833B2 (en)2004-01-232009-11-27Integrated data traffic monitoring system
US14/480,299US10326777B2 (en)2004-01-232014-09-08Integrated data traffic monitoring system

Applications Claiming Priority (4)

Application NumberPriority DateFiling DateTitle
US53896004P2004-01-232004-01-23
US76893104A2004-01-292004-01-29
US11/042,493US20050193429A1 (en)2004-01-232005-01-24Integrated data traffic monitoring system
US12/592,580US8832833B2 (en)2004-01-232009-11-27Integrated data traffic monitoring system

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US11/042,493ContinuationUS20050193429A1 (en)2004-01-232005-01-24Integrated data traffic monitoring system

Related Child Applications (1)

Application NumberTitlePriority DateFiling Date
US14/480,299ContinuationUS10326777B2 (en)2004-01-232014-09-08Integrated data traffic monitoring system

Publications (2)

Publication NumberPublication Date
US20100257598A1true US20100257598A1 (en)2010-10-07
US8832833B2 US8832833B2 (en)2014-09-09

Family

ID=35336629

Family Applications (3)

Application NumberTitlePriority DateFiling Date
US11/042,493AbandonedUS20050193429A1 (en)2004-01-232005-01-24Integrated data traffic monitoring system
US12/592,580Expired - LifetimeUS8832833B2 (en)2004-01-232009-11-27Integrated data traffic monitoring system
US14/480,299Active2026-08-08US10326777B2 (en)2004-01-232014-09-08Integrated data traffic monitoring system

Family Applications Before (1)

Application NumberTitlePriority DateFiling Date
US11/042,493AbandonedUS20050193429A1 (en)2004-01-232005-01-24Integrated data traffic monitoring system

Family Applications After (1)

Application NumberTitlePriority DateFiling Date
US14/480,299Active2026-08-08US10326777B2 (en)2004-01-232014-09-08Integrated data traffic monitoring system

Country Status (2)

CountryLink
US (3)US20050193429A1 (en)
WO (1)WO2006080930A1 (en)

Cited By (30)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20080115203A1 (en)*2006-11-142008-05-15Uri ElzurMethod and system for traffic engineering in secured networks
US20100256823A1 (en)*2009-04-042010-10-07Cisco Technology, Inc.Mechanism for On-Demand Environmental Services Based on Network Activity
US20120192246A1 (en)*2010-11-242012-07-26Tufin Software Technologies Ltd.Method and system for mapping between connectivity requests and a security rule set
US20120266230A1 (en)*2011-04-152012-10-18Lockheed Martin CorporationMethod and apparatus for cyber security
US20130094500A1 (en)*2011-10-132013-04-18Rosemount Inc.Process installation network intrusion detection and prevention
WO2013062726A1 (en)*2011-10-242013-05-02Le Sant AurelienSystem and method for managing industrial processes
US20130333032A1 (en)*2012-06-122013-12-12Verizon Patent And Licensing Inc.Network based device security and controls
US20130340022A1 (en)*2012-06-132013-12-19Hulu LlcArchitecture for Simulation of Network Conditions for Video Delivery
CN103916399A (en)*2014-04-152014-07-09浪潮电子信息产业股份有限公司Computer information security defense system
US9240996B1 (en)*2013-03-282016-01-19Emc CorporationMethod and system for risk-adaptive access control of an application action
US20160315940A1 (en)*2013-07-022016-10-27Open Text S.A.System and method for controlling access
US20170295076A1 (en)*2014-09-302017-10-12OrangeMethod for accessing data related to at least one operation implented by a node device of a network
US10212023B2 (en)*2016-10-052019-02-19Vmware, Inc.Methods and systems to identify and respond to low-priority event messages
US20190297056A1 (en)*2018-03-262019-09-26Kuo ChiangMethods for preventing or detecting computer attacks in a cloud-based environment and apparatuses using the same
US20200153858A1 (en)*2016-10-252020-05-14Fortress Cyber Security, LLCSecurity appliance
US10862864B2 (en)2018-04-042020-12-08Sophos LimitedNetwork device with transparent heartbeat processing
US10972431B2 (en)2018-04-042021-04-06Sophos LimitedDevice management based on groups of network adapters
US20210126924A1 (en)*2009-11-302021-04-29Red Hat, Inc.Monitoring cloud computing environments
EP3550795B1 (en)2014-04-162021-06-02Centripetal Networks Inc.Methods and systems for protecting a secured network
US11075931B1 (en)*2018-12-312021-07-27Stealthbits Technologies LlcSystems and methods for detecting malicious network activity
US20210258326A1 (en)*2020-02-172021-08-19Avanan Inc.Responsive actions to suspicious e-mail, as inferred from negative user assessment, by third party security systems without modification of existing e-mail clients
US11140195B2 (en)*2018-04-042021-10-05Sophos LimitedSecure endpoint in a heterogenous enterprise network
US11184391B2 (en)2016-06-302021-11-23Sophos LimitedServer-client authentication with integrated status update
US11271950B2 (en)2018-04-042022-03-08Sophos LimitedSecuring endpoints in a heterogenous enterprise network
US20230013924A1 (en)*2019-12-172023-01-19Signify Holding B.V.Route discovery in networks with combo nodes
US11616758B2 (en)2018-04-042023-03-28Sophos LimitedNetwork device for securing endpoints in a heterogeneous enterprise network
EP4318410A3 (en)*2018-10-092024-04-17eBay Inc.Distributed application architectures using blockchain and distributed file systems
US12164661B1 (en)*2024-01-302024-12-10Grip Security LtdSecurity interface for controlling access to email-data
US12219360B1 (en)2024-07-242025-02-04Netskope, Inc.Cellular IoT security using dynamic policy-driven mechanisms for threat mitigation
US12255898B1 (en)*2024-09-052025-03-18Grip Security LtdManagement of access to external authorized services

Families Citing this family (127)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8079086B1 (en)1997-11-062011-12-13Finjan, Inc.Malicious mobile code runtime monitoring system and methods
US7058822B2 (en)2000-03-302006-06-06Finjan Software, Ltd.Malicious mobile code runtime monitoring system and methods
US9219755B2 (en)1996-11-082015-12-22Finjan, Inc.Malicious mobile code runtime monitoring system and methods
US20040052664A1 (en)*2001-01-052004-03-18Atsuji SaitoHigh-pressure fuel feed pump
MY141160A (en)*2003-01-132010-03-31Multimedia Glory Sdn BhdSystem and method of preventing the transmission of known and unknown electronic content to and from servers or workstations connected to a common network
US7219131B2 (en)*2003-01-162007-05-15Ironport Systems, Inc.Electronic message delivery using an alternate source approach
CA2554915C (en)*2004-02-172013-05-28Ironport Systems, Inc.Collecting, aggregating, and managing information relating to electronic messages
US7756930B2 (en)2004-05-282010-07-13Ironport Systems, Inc.Techniques for determining the reputation of a message sender
US7870200B2 (en)2004-05-292011-01-11Ironport Systems, Inc.Monitoring the flow of messages received at a server
US7873695B2 (en)2004-05-292011-01-18Ironport Systems, Inc.Managing connections and messages at a server by associating different actions for both different senders and different recipients
US7849142B2 (en)2004-05-292010-12-07Ironport Systems, Inc.Managing connections, messages, and directory harvest attacks at a server
US7748038B2 (en)*2004-06-162010-06-29Ironport Systems, Inc.Method and apparatus for managing computer virus outbreaks
US7562389B1 (en)*2004-07-302009-07-14Cisco Technology, Inc.Method and system for network security
US7555774B2 (en)*2004-08-022009-06-30Cisco Technology, Inc.Inline intrusion detection using a single physical port
GB0420810D0 (en)*2004-09-182004-10-20IbmData processing system and method
US7577737B2 (en)*2004-09-232009-08-18Cisco Technology, Inc.Method and apparatus for controlling data to be routed in a data communications network
US7937761B1 (en)*2004-12-172011-05-03Symantec CorporationDifferential threat detection processing
US7725938B2 (en)2005-01-202010-05-25Cisco Technology, Inc.Inline intrusion detection
EP1851651A2 (en)*2005-02-112007-11-07Critical Path Inc.Methods and systems for communicating digital content
JP4557815B2 (en)*2005-06-132010-10-06富士通株式会社 Relay device and relay system
US20060288418A1 (en)*2005-06-152006-12-21Tzu-Jian YangComputer-implemented method with real-time response mechanism for detecting viruses in data transfer on a stream basis
DE102005046935B4 (en)*2005-09-302009-07-23Nokia Siemens Networks Gmbh & Co.Kg Network access node computer to a communication network, communication system and method for assigning a protection device
US7647623B2 (en)*2005-10-172010-01-12Alcatel LucentApplication layer ingress filtering
US8468589B2 (en)2006-01-132013-06-18Fortinet, Inc.Computerized system and method for advanced network content processing
US7966654B2 (en)2005-11-222011-06-21Fortinet, Inc.Computerized system and method for policy-based content filtering
US8266697B2 (en)*2006-03-042012-09-1121St Century Technologies, Inc.Enabling network intrusion detection by representing network activity in graphical form utilizing distributed data sensors to detect and transmit activity data
GB2432934B (en)*2006-03-142007-12-19Streamshield Networks LtdA method and apparatus for providing network security
JP2007251866A (en)*2006-03-202007-09-27Kyocera Mita CorpElectronic equipment device
US20070237129A1 (en)*2006-04-062007-10-11Dennis SychMethod and system for automatic intruder blocking on an Internet Protocol based network
US7606214B1 (en)*2006-09-142009-10-20Trend Micro IncorporatedAnti-spam implementations in a router at the network layer
US7849186B2 (en)*2006-09-212010-12-07Commtouch Software Ltd.Device, method and system for detecting unwanted conversational media session
US8484733B2 (en)*2006-11-282013-07-09Cisco Technology, Inc.Messaging security device
US20080209558A1 (en)*2007-02-222008-08-28Aladdin Knowledge SystemsSelf-defensive protected software with suspended latent license enforcement
US7870610B1 (en)*2007-03-162011-01-11The Board Of Directors Of The Leland Stanford Junior UniversityDetection of malicious programs
US20080295153A1 (en)*2007-05-242008-11-27Zhidan ChengSystem and method for detection and communication of computer infection status in a networked environment
US20080320596A1 (en)*2007-06-222008-12-25Feng Chi WangDistributed digital rights management system and methods for use therewith
US20090019121A1 (en)*2007-07-102009-01-15Messagelabs LimitedMessage processing
US8087061B2 (en)*2007-08-072011-12-27Microsoft CorporationResource-reordered remediation of malware threats
US20090064334A1 (en)*2007-08-302009-03-05International Business Machines CorporationAdaptive Autonomic Threat Detection and Quarantine
KR100916324B1 (en)*2007-11-082009-09-11한국전자통신연구원 Method, device and system for managing malicious code distribution site using firewall
US8561129B2 (en)*2008-02-282013-10-15Mcafee, IncUnified network threat management with rule classification
US20090265777A1 (en)*2008-04-212009-10-22Zytron Corp.Collaborative and proactive defense of networks and information systems
US8627060B2 (en)*2008-04-302014-01-07Viasat, Inc.Trusted network interface
US8279768B2 (en)*2008-05-052012-10-02Eaton CorporationMethods, devices and computer program products for capturing events associated network anomalies
DE602008004491D1 (en)2008-07-042011-02-24Alcatel Lucent Method and system for a communication network against intruders
US8490171B2 (en)*2008-07-142013-07-16Tufin Software Technologies Ltd.Method of configuring a security gateway and system thereof
US8122129B2 (en)*2008-09-092012-02-21Actiance, Inc.Hash-based resource matching
US20100064353A1 (en)*2008-09-092010-03-11Facetime Communications, Inc.User Mapping Mechanisms
US20110238587A1 (en)*2008-09-232011-09-29Savvis, Inc.Policy management system and method
US8220056B2 (en)*2008-09-232012-07-10Savvis, Inc.Threat management system and method
US8484338B2 (en)*2008-10-022013-07-09Actiance, Inc.Application detection architecture and techniques
US8621065B1 (en)*2008-10-232013-12-31Amazon Technologies, Inc.Dynamic blocking of suspicious electronic submissions
US8463730B1 (en)2008-10-242013-06-11Vmware, Inc.Rapid evaluation of numerically large complex rules governing network and application transactions
US9559800B1 (en)2008-10-242017-01-31Vmware, Inc.Dynamic packet filtering
US8806632B2 (en)*2008-11-172014-08-12Solarwinds Worldwide, LlcSystems, methods, and devices for detecting security vulnerabilities in IP networks
US20100125663A1 (en)*2008-11-172010-05-20Donovan John JSystems, methods, and devices for detecting security vulnerabilities in ip networks
US9413598B2 (en)*2009-09-022016-08-09International Business Machines CorporationGraph structures for event matching
US8413241B2 (en)*2009-09-172013-04-02Oracle America, Inc.Integrated intrusion deflection, detection and introspection
US8953631B2 (en)*2010-06-302015-02-10Intel CorporationInterruption, at least in part, of frame transmission
US9384112B2 (en)*2010-07-012016-07-05Logrhythm, Inc.Log collection, structuring and processing
KR101377462B1 (en)*2010-08-242014-03-25한국전자통신연구원Automated Control Method And Apparatus of DDos Attack Prevention Policy Using the status of CPU and Memory
JP5703111B2 (en)*2011-04-252015-04-15株式会社日立製作所 Communication system and apparatus
US8726385B2 (en)*2011-10-052014-05-13Mcafee, Inc.Distributed system and method for tracking and blocking malicious internet hosts
US9843488B2 (en)2011-11-072017-12-12Netflow Logic CorporationMethod and system for confident anomaly detection in computer network traffic
US10171352B2 (en)*2011-12-212019-01-01Nec CorporationCommunication system, node, control device, communication method, and program
US8953471B2 (en)*2012-01-052015-02-10International Business Machines CorporationCounteracting spam in voice over internet protocol telephony systems
US8914406B1 (en)*2012-02-012014-12-16Vorstack, Inc.Scalable network security with fast response protocol
US9137258B2 (en)*2012-02-012015-09-15Brightpoint Security, Inc.Techniques for sharing network security event information
US9710644B2 (en)2012-02-012017-07-18Servicenow, Inc.Techniques for sharing network security event information
US9245439B2 (en)*2012-03-282016-01-26Ecolink Intelligent Technology, Inc.Temporary security bypass method and apparatus
FR2995427B1 (en)*2012-09-122015-07-17Tibsys DEVICE FOR MONITORING FRAMES TO THE INTERCONNECTION OF A DOMESTIC HOME NETWORK AND THE INTERNET
US9930011B1 (en)2012-11-302018-03-27United Services Automobile Association (Usaa)Private network request forwarding
US10666620B1 (en)2012-11-302020-05-26United Services Automobile Association (Usaa)Private network request forwarding
US9467326B2 (en)*2012-12-032016-10-11Hewlett-Packard Development Company, L.P.Rate limiting mechanism based on device load/capacity or traffic content
JP6001781B2 (en)*2013-07-052016-10-05日本電信電話株式会社 Unauthorized access detection system and unauthorized access detection method
CN105981079A (en)2013-07-152016-09-28赛博赛尔有限公司Network protection
US9548993B2 (en)*2013-08-282017-01-17Verizon Patent And Licensing Inc.Automated security gateway
GB2517740B (en)*2013-08-302016-03-30Eco Hive LtdA Monitoring Arrangement
US9332903B2 (en)2013-09-192016-05-10Gn Otometrics A/SHeadgear for observation of eye movements
KR101502490B1 (en)*2013-10-182015-03-13주식회사 케이티Subscibe terminal and security farm node for monitoring network traffic
US20150128267A1 (en)*2013-11-062015-05-07Mcafee, Inc.Context-aware network forensics
US10334085B2 (en)*2015-01-292019-06-25Splunk Inc.Facilitating custom content extraction from network packets
US10230742B2 (en)*2015-01-302019-03-12Anomali IncorporatedSpace and time efficient threat detection
CN105765942A (en)*2015-03-182016-07-13策安保安有限公司 Systems and methods for information security threat disruption via a border gateway
CA2994257C (en)2015-07-022022-03-15Reliaquest Holdings, LlcThreat intelligence system and method
US10193919B2 (en)2015-08-242019-01-29Empow Cyber Security, LtdRisk-chain generation of cyber-threats
AU2016367922B2 (en)2015-12-112019-08-08Servicenow, Inc.Computer network threat assessment
US10348687B2 (en)*2015-12-182019-07-09Worcester Polytechnic InstituteMethod and apparatus for using software defined networking and network function virtualization to secure residential networks
JP2017147575A (en)*2016-02-162017-08-24富士通株式会社 Control program, control device, and control method
DE102016107647B4 (en)2016-03-082018-08-30Viktor Mraz Method and storage medium for securing / monitoring a network
CA2968710A1 (en)*2016-05-312017-11-30Valarie Ann FindlaySecurity threat information gathering and incident reporting systems and methods
US10419494B2 (en)2016-09-262019-09-17Splunk Inc.Managing the collection of forensic data from endpoint devices
US10425442B2 (en)*2016-09-262019-09-24Splunk Inc.Correlating forensic data collected from endpoint devices with other non-forensic data
CN106506556B (en)*2016-12-292019-11-19北京神州绿盟信息安全科技股份有限公司A kind of network flow abnormal detecting method and device
US10333960B2 (en)2017-05-032019-06-25Servicenow, Inc.Aggregating network security data for export
US20180324207A1 (en)2017-05-052018-11-08Servicenow, Inc.Network security threat intelligence sharing
CN107181769A (en)*2017-07-282017-09-19山东超越数控电子有限公司A kind of network intrusion prevention system and method
US11494395B2 (en)2017-07-312022-11-08Splunk Inc.Creating dashboards for viewing data in a data storage system based on natural language requests
US11240207B2 (en)2017-08-112022-02-01L3 Technologies, Inc.Network isolation
US11601467B2 (en)2017-08-242023-03-07L3 Technologies, Inc.Service provider advanced threat protection
US11223601B2 (en)2017-09-282022-01-11L3 Technologies, Inc.Network isolation for collaboration software
US11374906B2 (en)2017-09-282022-06-28L3 Technologies, Inc.Data exfiltration system and methods
US11552987B2 (en)*2017-09-282023-01-10L3 Technologies, Inc.Systems and methods for command and control protection
US11336619B2 (en)2017-09-282022-05-17L3 Technologies, Inc.Host process and memory separation
US11550898B2 (en)2017-10-232023-01-10L3 Technologies, Inc.Browser application implementing sandbox based internet isolation
US11368474B2 (en)*2018-01-232022-06-21Rapid7, Inc.Detecting anomalous internet behavior
CN108762905B (en)*2018-05-242020-12-11苏州乐麟无线信息科技有限公司Method and device for processing multitask events
US10762192B2 (en)*2018-08-222020-09-01Paypal, Inc.Cleartext password detection using machine learning
US11233816B2 (en)*2019-02-152022-01-25Verizon Patent And Licensing Inc.User-determined network traffic filtering
US11057428B1 (en)*2019-03-282021-07-06Rapid7, Inc.Honeytoken tracker
US10893060B2 (en)*2019-04-052021-01-12Material Security Inc.Defanging malicious electronic files based on trusted user reporting
US11444919B2 (en)2019-05-202022-09-13Woodward, Inc.Mission critical security zone
WO2021010223A1 (en)*2019-07-122021-01-21日立オートモティブシステムズ株式会社Gateway device
FR3104761A1 (en)*2019-12-122021-06-18Orange Method for monitoring data passing through user equipment
RU2743974C1 (en)2019-12-192021-03-01Общество с ограниченной ответственностью "Группа АйБи ТДС"System and method for scanning security of elements of network architecture
RU2722693C1 (en)2020-01-272020-06-03Общество с ограниченной ответственностью «Группа АйБи ТДС»Method and system for detecting the infrastructure of a malicious software or a cybercriminal
US11677758B2 (en)*2020-03-042023-06-13Cisco Technology, Inc.Minimizing data flow between computing infrastructures for email security
US11651067B2 (en)*2020-06-232023-05-16Acronis International GmbhSystems and methods for detecting stored passwords vulnerable to compromise
US11836032B2 (en)*2020-10-152023-12-05State Farm Mutual Automobile Insurance CompanyError monitoring and prevention in computing systems based on determined trends and routing a data stream over a second network having less latency
US11362996B2 (en)*2020-10-272022-06-14Centripetal Networks, Inc.Methods and systems for efficient adaptive logging of cyber threat incidents
US11363062B1 (en)2021-03-312022-06-14Peakstar Technologies Inc.System and method for decentralized internet traffic filtering policy reporting
US20220353279A1 (en)*2021-04-292022-11-03KnowBe4, Inc.Systems and methods for determination of indicators of malicious elements within messages
NL2030861B1 (en)2021-06-012023-03-14Trust LtdSystem and method for external monitoring a cyberattack surface
RU2769075C1 (en)*2021-06-102022-03-28Общество с ограниченной ответственностью "Группа АйБи ТДС"System and method for active detection of malicious network resources
CN114124450A (en)*2021-10-152022-03-01广东电网有限责任公司广州供电局Network security system and method for remote storage battery capacity checking
US20230140706A1 (en)*2021-11-012023-05-04Recorded Future, Inc.Pipelined Malware Infrastructure Identification
CN114510402A (en)*2022-04-192022-05-17深圳市信润富联数字科技有限公司System application level performance monitoring system and method

Citations (26)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6192518B1 (en)*1998-01-222001-02-20Mis Only, Inc.Method for distributing software over network links via electronic mail
US6256775B1 (en)*1997-12-112001-07-03International Business Machines CorporationFacilities for detailed software performance analysis in a multithreaded processor
US6363489B1 (en)*1999-11-292002-03-26Forescout Technologies Inc.Method for automatic intrusion detection and deflection in a network
US6405250B1 (en)*1999-01-252002-06-11Lucent Technologies Inc.Network management system based on passive monitoring and proactive management for formulation behavior state transition models
US20020078202A1 (en)*2000-12-152002-06-20Tadanao AndoIP network system having unauthorized intrusion safeguard function
US20020087882A1 (en)*2000-03-162002-07-04Bruce SchneierMehtod and system for dynamic network intrusion monitoring detection and response
US20020107953A1 (en)*2001-01-162002-08-08Mark OntiverosMethod and device for monitoring data traffic and preventing unauthorized access to a network
US20020133586A1 (en)*2001-01-162002-09-19Carter ShanklinMethod and device for monitoring data traffic and preventing unauthorized access to a network
US20020165954A1 (en)*2001-05-042002-11-07Kave EshghiSystem and method for monitoring browser event activities
US20020188864A1 (en)*2001-06-062002-12-12Jackson Gary ManuelIntrusion prevention system
US6526413B2 (en)*1999-09-282003-02-25Microsoft CorporationArchitecture for a hierarchical folder structure in hand-held computers
US20030061256A1 (en)*2001-04-192003-03-27Infomove, Inc.Method and system for generalized and adaptive transaction processing between uniform information services and applications
US20030172064A1 (en)*2002-03-082003-09-11Snapp Robert F.Method for preventing improper correction of a database during an updating process
US6701440B1 (en)*2000-01-062004-03-02Networks Associates Technology, Inc.Method and system for protecting a computer using a remote e-mail scanning device
US20040133672A1 (en)*2003-01-082004-07-08Partha BhattacharyaNetwork security monitoring system
US6816890B2 (en)*2001-05-282004-11-09Hitachi, Ltd.Gateway apparatus with LAC function
US20040250124A1 (en)*2003-05-192004-12-09Vsecure Technologies (Us) Inc.Dynamic network protection
US20040255167A1 (en)*2003-04-282004-12-16Knight James MichaelMethod and system for remote network security management
US20050005017A1 (en)*2003-07-032005-01-06Arbor Networks, Inc.Method and system for reducing scope of self-propagating attack code in network
US20050177868A1 (en)*2003-07-112005-08-11Computer Associates Think, Inc.Method and system for protecting against computer viruses
US20050193430A1 (en)*2002-10-012005-09-01Gideon CohenSystem and method for risk detection and analysis in a computer network
US20050251570A1 (en)*2002-04-182005-11-10John HeasmanIntrusion detection system
US6993022B1 (en)*2000-07-062006-01-31Sony CorporationMethod of and apparatus for directly mapping communications through a router between nodes on different buses within a network of buses
US20060031938A1 (en)*2002-10-222006-02-09Unho ChoiIntegrated emergency response system in information infrastructure and operating method therefor
US7213265B2 (en)*2000-11-152007-05-01Lockheed Martin CorporationReal time active network compartmentalization
US7263561B1 (en)*2001-08-242007-08-28Mcafee, Inc.Systems and methods for making electronic files that have been converted to a safe format available for viewing by an intended recipient

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6678827B1 (en)*1999-05-062004-01-13Watchguard Technologies, Inc.Managing multiple network security devices from a manager device
TW453072B (en)*1999-08-182001-09-01Alma Baba Technical Res Lab CoSystem for montoring network for cracker attacic

Patent Citations (27)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6256775B1 (en)*1997-12-112001-07-03International Business Machines CorporationFacilities for detailed software performance analysis in a multithreaded processor
US6192518B1 (en)*1998-01-222001-02-20Mis Only, Inc.Method for distributing software over network links via electronic mail
US6405250B1 (en)*1999-01-252002-06-11Lucent Technologies Inc.Network management system based on passive monitoring and proactive management for formulation behavior state transition models
US6526413B2 (en)*1999-09-282003-02-25Microsoft CorporationArchitecture for a hierarchical folder structure in hand-held computers
US6363489B1 (en)*1999-11-292002-03-26Forescout Technologies Inc.Method for automatic intrusion detection and deflection in a network
US6701440B1 (en)*2000-01-062004-03-02Networks Associates Technology, Inc.Method and system for protecting a computer using a remote e-mail scanning device
US20020087882A1 (en)*2000-03-162002-07-04Bruce SchneierMehtod and system for dynamic network intrusion monitoring detection and response
US6993022B1 (en)*2000-07-062006-01-31Sony CorporationMethod of and apparatus for directly mapping communications through a router between nodes on different buses within a network of buses
US7213265B2 (en)*2000-11-152007-05-01Lockheed Martin CorporationReal time active network compartmentalization
US20020078202A1 (en)*2000-12-152002-06-20Tadanao AndoIP network system having unauthorized intrusion safeguard function
US20020133586A1 (en)*2001-01-162002-09-19Carter ShanklinMethod and device for monitoring data traffic and preventing unauthorized access to a network
US20020107953A1 (en)*2001-01-162002-08-08Mark OntiverosMethod and device for monitoring data traffic and preventing unauthorized access to a network
US20030061256A1 (en)*2001-04-192003-03-27Infomove, Inc.Method and system for generalized and adaptive transaction processing between uniform information services and applications
US20020165954A1 (en)*2001-05-042002-11-07Kave EshghiSystem and method for monitoring browser event activities
US6816890B2 (en)*2001-05-282004-11-09Hitachi, Ltd.Gateway apparatus with LAC function
US20020188864A1 (en)*2001-06-062002-12-12Jackson Gary ManuelIntrusion prevention system
US7263561B1 (en)*2001-08-242007-08-28Mcafee, Inc.Systems and methods for making electronic files that have been converted to a safe format available for viewing by an intended recipient
US20030172064A1 (en)*2002-03-082003-09-11Snapp Robert F.Method for preventing improper correction of a database during an updating process
US20050251570A1 (en)*2002-04-182005-11-10John HeasmanIntrusion detection system
US20050193430A1 (en)*2002-10-012005-09-01Gideon CohenSystem and method for risk detection and analysis in a computer network
US6952779B1 (en)*2002-10-012005-10-04Gideon CohenSystem and method for risk detection and analysis in a computer network
US20060031938A1 (en)*2002-10-222006-02-09Unho ChoiIntegrated emergency response system in information infrastructure and operating method therefor
US20040133672A1 (en)*2003-01-082004-07-08Partha BhattacharyaNetwork security monitoring system
US20040255167A1 (en)*2003-04-282004-12-16Knight James MichaelMethod and system for remote network security management
US20040250124A1 (en)*2003-05-192004-12-09Vsecure Technologies (Us) Inc.Dynamic network protection
US20050005017A1 (en)*2003-07-032005-01-06Arbor Networks, Inc.Method and system for reducing scope of self-propagating attack code in network
US20050177868A1 (en)*2003-07-112005-08-11Computer Associates Think, Inc.Method and system for protecting against computer viruses

Cited By (58)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20080115203A1 (en)*2006-11-142008-05-15Uri ElzurMethod and system for traffic engineering in secured networks
US9461975B2 (en)2006-11-142016-10-04Broadcom CorporationMethod and system for traffic engineering in secured networks
US9185097B2 (en)2006-11-142015-11-10Broadcom CorporationMethod and system for traffic engineering in secured networks
US8418241B2 (en)*2006-11-142013-04-09Broadcom CorporationMethod and system for traffic engineering in secured networks
US20100256823A1 (en)*2009-04-042010-10-07Cisco Technology, Inc.Mechanism for On-Demand Environmental Services Based on Network Activity
US20210126924A1 (en)*2009-11-302021-04-29Red Hat, Inc.Monitoring cloud computing environments
US11949709B2 (en)*2009-11-302024-04-02Red Hat, Inc.Monitoring cloud computing environments
US9313175B2 (en)*2010-11-242016-04-12Tufin Software Technologes Ltd.Method and system for mapping between connectivity requests and a security rule set
US8914841B2 (en)*2010-11-242014-12-16Tufin Software Technologies Ltd.Method and system for mapping between connectivity requests and a security rule set
US20150074755A1 (en)*2010-11-242015-03-12Tufin Software Technologies Ltd.Method and system for mapping between connectivity requests and a security rule set
US20120192246A1 (en)*2010-11-242012-07-26Tufin Software Technologies Ltd.Method and system for mapping between connectivity requests and a security rule set
US9065799B2 (en)*2011-04-152015-06-23Lockheed Martin CorporationMethod and apparatus for cyber security
US20120266230A1 (en)*2011-04-152012-10-18Lockheed Martin CorporationMethod and apparatus for cyber security
US20130094500A1 (en)*2011-10-132013-04-18Rosemount Inc.Process installation network intrusion detection and prevention
US9270642B2 (en)*2011-10-132016-02-23Rosemount Inc.Process installation network intrusion detection and prevention
WO2013062726A1 (en)*2011-10-242013-05-02Le Sant AurelienSystem and method for managing industrial processes
US20130333032A1 (en)*2012-06-122013-12-12Verizon Patent And Licensing Inc.Network based device security and controls
US9055090B2 (en)*2012-06-122015-06-09Verizon Patent And Licensing Inc.Network based device security and controls
US8775672B2 (en)*2012-06-132014-07-08Hulu, LLCArchitecture for simulation of network conditions for video delivery
US20130340022A1 (en)*2012-06-132013-12-19Hulu LlcArchitecture for Simulation of Network Conditions for Video Delivery
US12107893B2 (en)2012-10-222024-10-01Centripetal Networks, LlcMethods and systems for protecting a secured network
US20160088005A1 (en)*2013-03-282016-03-24Emc CorporationMethod and system for risk-adaptive access control of an application action
US9240996B1 (en)*2013-03-282016-01-19Emc CorporationMethod and system for risk-adaptive access control of an application action
US9992213B2 (en)*2013-03-282018-06-05Emc CorporationRisk-adaptive access control of an application action based on threat detection data
US20160315940A1 (en)*2013-07-022016-10-27Open Text S.A.System and method for controlling access
US10154035B2 (en)*2013-07-022018-12-11Open Text Sa UlcSystem and method for controlling access
CN103916399A (en)*2014-04-152014-07-09浪潮电子信息产业股份有限公司Computer information security defense system
EP3550795B1 (en)2014-04-162021-06-02Centripetal Networks Inc.Methods and systems for protecting a secured network
US11477237B2 (en)2014-04-162022-10-18Centripetal Networks, Inc.Methods and systems for protecting a secured network
EP3869767B1 (en)2014-04-162022-01-05Centripetal Networks Inc.Methods and systems for protecting a secured network
US10841186B2 (en)*2014-09-302020-11-17OrangeMethod for accessing data related to at least one operation implented by a node device of a network
US20170295076A1 (en)*2014-09-302017-10-12OrangeMethod for accessing data related to at least one operation implented by a node device of a network
US12244641B2 (en)2016-06-302025-03-04Sophos LimitedApplication firewall
US11184392B2 (en)2016-06-302021-11-23Sophos LimitedDetecting lateral movement by malicious applications
US11736522B2 (en)2016-06-302023-08-22Sophos LimitedServer-client authentication with integrated status update
US11722521B2 (en)2016-06-302023-08-08Sophos LimitedApplication firewall
US11184391B2 (en)2016-06-302021-11-23Sophos LimitedServer-client authentication with integrated status update
US10212023B2 (en)*2016-10-052019-02-19Vmware, Inc.Methods and systems to identify and respond to low-priority event messages
US20200153858A1 (en)*2016-10-252020-05-14Fortress Cyber Security, LLCSecurity appliance
US11575705B2 (en)*2016-10-252023-02-07Fortress Cyber Security, LLCSecurity appliance
US11985163B2 (en)*2016-10-252024-05-14Fortress Cyber Security, LLCSecurity appliance
US10841281B2 (en)*2018-03-262020-11-17Kuo ChiangMethods for preventing or detecting computer attacks in a cloud-based environment and apparatuses using the same
US20190297056A1 (en)*2018-03-262019-09-26Kuo ChiangMethods for preventing or detecting computer attacks in a cloud-based environment and apparatuses using the same
US11140195B2 (en)*2018-04-042021-10-05Sophos LimitedSecure endpoint in a heterogenous enterprise network
US11616758B2 (en)2018-04-042023-03-28Sophos LimitedNetwork device for securing endpoints in a heterogeneous enterprise network
US10972431B2 (en)2018-04-042021-04-06Sophos LimitedDevice management based on groups of network adapters
US10862864B2 (en)2018-04-042020-12-08Sophos LimitedNetwork device with transparent heartbeat processing
US11271950B2 (en)2018-04-042022-03-08Sophos LimitedSecuring endpoints in a heterogenous enterprise network
US12147585B2 (en)2018-10-092024-11-19Ebay Inc.Distributed application architectures using blockchain and distributed file systems
EP4318410A3 (en)*2018-10-092024-04-17eBay Inc.Distributed application architectures using blockchain and distributed file systems
US11075931B1 (en)*2018-12-312021-07-27Stealthbits Technologies LlcSystems and methods for detecting malicious network activity
US12192876B2 (en)*2019-12-172025-01-07Signify Holding B.V.Route discovery in networks with combo nodes
US20230013924A1 (en)*2019-12-172023-01-19Signify Holding B.V.Route discovery in networks with combo nodes
US11736496B2 (en)*2020-02-172023-08-22Avanan, Inc.Responsive actions to suspicious e-mail, as inferred from negative user assessment, by third party security systems without modification of existing e-mail clients
US20210258326A1 (en)*2020-02-172021-08-19Avanan Inc.Responsive actions to suspicious e-mail, as inferred from negative user assessment, by third party security systems without modification of existing e-mail clients
US12164661B1 (en)*2024-01-302024-12-10Grip Security LtdSecurity interface for controlling access to email-data
US12219360B1 (en)2024-07-242025-02-04Netskope, Inc.Cellular IoT security using dynamic policy-driven mechanisms for threat mitigation
US12255898B1 (en)*2024-09-052025-03-18Grip Security LtdManagement of access to external authorized services

Also Published As

Publication numberPublication date
US20050193429A1 (en)2005-09-01
US20140380456A1 (en)2014-12-25
US8832833B2 (en)2014-09-09
WO2006080930A1 (en)2006-08-03
US10326777B2 (en)2019-06-18

Similar Documents

PublicationPublication DateTitle
US10326777B2 (en)Integrated data traffic monitoring system
US11290424B2 (en)Methods and systems for efficient network protection
US8631495B2 (en)Systems and methods for message threat management
US9160755B2 (en)Trusted communication network
US9185127B2 (en)Network protection service
US7007302B1 (en)Efficient management and blocking of malicious code and hacking attempts in a network environment
US8108930B2 (en)Secure self-organizing and self-provisioning anomalous event detection systems
EP1488316B1 (en)Systems and methods for enhancing electronic communication security
US20070097976A1 (en)Suspect traffic redirection
US20030110392A1 (en)Detecting intrusions
US20070244974A1 (en)Bounce Management in a Trusted Communication Network
US10135785B2 (en)Network security system to intercept inline domain name system requests
US20060010209A1 (en)Server for sending electronics messages
WO2007146690A2 (en)Systems and methods for graphically displaying messaging traffic
JP2006319982A (en)Worm-specifying and non-activating method and apparatus in communications network
US20060206615A1 (en)Systems and methods for dynamic and risk-aware network security
JP2009515426A (en) High reliability communication network
US20220239676A1 (en)Cyber-safety threat detection system
US20110185166A1 (en)Slider Control for Security Grouping and Enforcement
EP1629623A1 (en)Systems and methods for dynamic and risk-aware network security
Aljahdali et al.STREAMLINING THREAT RESPONSE AND AUTOMATING CRITICAL USE CASES WITH SECURITY ORCHESTRATION, AUTOMATION AND RESPONSE (SOAR)

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:THE BARRIER GROUP, MINNESOTA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:DEMOPOULOS, ROBERT JAMES;FLADEBO, DAVID JAMES;REEL/FRAME:027569/0409

Effective date:20040129

STCFInformation on status: patent grant

Free format text:PATENTED CASE

MAFPMaintenance fee payment

Free format text:PAYMENT OF MAINTENANCE FEE, 4TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2551)

Year of fee payment:4

ASAssignment

Owner name:CLOUDCOVER USA, INC., MINNESOTA

Free format text:MERGER;ASSIGNOR:THE B1 GROUP, INC.;REEL/FRAME:049751/0391

Effective date:20190501

Owner name:THE B1 GROUP, INC., MINNESOTA

Free format text:EXCHANGE;ASSIGNOR:THE BARRIER GROUP, LLC;REEL/FRAME:049752/0009

Effective date:20190425

ASAssignment

Owner name:CLOUDCOVER USA, INC., MINNESOTA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:THE B1 GROUP, INC.;REEL/FRAME:052978/0873

Effective date:20200618

Owner name:THE B1 GROUP, INC., MINNESOTA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:THE BARRIER GROUP, LLC;REEL/FRAME:052978/0927

Effective date:20200618

ASAssignment

Owner name:CLOUDCOVER IP, LLC, MINNESOTA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:CLOUDCOVER USA, INC.;REEL/FRAME:053284/0774

Effective date:20200722

MAFPMaintenance fee payment

Free format text:PAYMENT OF MAINTENANCE FEE, 8TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2552); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

Year of fee payment:8

ASAssignment

Owner name:MONTGOMERY CAPITAL PARTNERS V, LP, TEXAS

Free format text:SECURITY INTEREST;ASSIGNOR:CLOUDCOVER IP, LLC;REEL/FRAME:061741/0940

Effective date:20221109

ASAssignment

Owner name:CLOUDCOVER, LTD., MINNESOTA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:CLOUDCOVER IP, LLC;REEL/FRAME:065968/0843

Effective date:20231206

ASAssignment

Owner name:CLOUDCOVER IP, LLC, MINNESOTA

Free format text:RELEASE BY SECURED PARTY;ASSIGNOR:MONTGOMERY CAPITAL PARTNERS V, LP.;REEL/FRAME:067126/0731

Effective date:20240415

ASAssignment

Owner name:TEGO CYBER INC., NEVADA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:CLOUDCOVER LTD;REEL/FRAME:069665/0653

Effective date:20241220

ASAssignment

Owner name:TROUDT, JOHN, WISCONSIN

Free format text:SECURITY INTEREST;ASSIGNOR:CLOUDCOVER, LTD;REEL/FRAME:070841/0512

Effective date:20240325

ASAssignment

Owner name:CLOUDCOVER, LTD., MINNESOTA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:TEGO CYBER INC.;REEL/FRAME:070997/0648

Effective date:20250501


[8]ページ先頭

©2009-2025 Movatter.jp